Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWhqMmotNzd4bS1tYzV2

Jinja2 sandbox escape vulnerability

In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.

Permalink: https://github.com/advisories/GHSA-hj2j-77xm-mc5v
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWhqMmotNzd4bS1tYzV2
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 5 years ago
Updated: 2 months ago


CVSS Score: 8.6
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

EPSS Percentage: 0.00434
EPSS Percentile: 0.74919

Identifiers: GHSA-hj2j-77xm-mc5v, CVE-2016-10745
References: Repository: https://github.com/pallets/jinja
Blast Radius: 44.1

Affected Packages

pypi:Jinja2
Dependent packages: 4,068
Dependent repositories: 133,056
Downloads: 229,886,080 last month
Affected Version Ranges: < 2.8.1
Fixed in: 2.8.1
All affected versions: 2.1.1, 2.2.1, 2.3.1, 2.4.1, 2.5.1, 2.5.2, 2.5.3, 2.5.4, 2.5.5, 2.7.1, 2.7.2, 2.7.3
All unaffected versions: 2.8.1, 2.9.1, 2.9.2, 2.9.3, 2.9.4, 2.9.5, 2.9.6, 2.10.1, 2.10.2, 2.10.3, 2.11.0, 2.11.1, 2.11.2, 2.11.3, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.1.0, 3.1.1, 3.1.2, 3.1.3, 3.1.4